CN109600254A - The generation method and related system of full link log - Google Patents
The generation method and related system of full link log Download PDFInfo
- Publication number
- CN109600254A CN109600254A CN201811442226.1A CN201811442226A CN109600254A CN 109600254 A CN109600254 A CN 109600254A CN 201811442226 A CN201811442226 A CN 201811442226A CN 109600254 A CN109600254 A CN 109600254A
- Authority
- CN
- China
- Prior art keywords
- service
- list
- call request
- call
- blacklist
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/069—Management of faults, events, alarms or notifications using logs of notifications; Post-processing of notifications
Abstract
This application provides the generation methods and related system of a kind of full link log, wherein in the generation method of full link log, after receiving call request, first judges whether the corresponding service of the call request belongs to monitored service;Judging that the corresponding service of the call request belongs to the monitored service, just after the corresponding service of the call request is called, generate link log, it solves for the problem that any one request and when calling service, generation link log causes to increase unnecessary link log.
Description
Technical field
This application involves technical field of data processing more particularly to a kind of generation methods and phase relation of full link log
System.
Background technique
For the request that requesting party sends, the calling that multiple services are executed by multiple nodes is generally required.By requesting party
Start until the calling link constituted between multiple nodes can then be referred to as full link.Full link log is then used to record each
It is a to service the state called by node.
Currently, realizing the generating process of full link log, the program of service is called generally by modification, allows service in quilt
It is generated after calling and transmits corresponding link log.However, the program of service is called in modification, it is meant that for any one request
And when calling the service, it is required to generate link log, this will increase many unnecessary link logs.
Summary of the invention
Based on above-mentioned the deficiencies in the prior art, the application proposes the generation method and related system of a kind of full link log,
When calling service to solve to request for any one, generation link log causes to increase unnecessary link log
Problem.
To solve the above problems, the scheme now proposed is as follows:
A kind of generation method of full link log, comprising:
Receive call request, wherein the call request is for calling service;
Judge whether the corresponding service of the call request belongs to monitored service;
If judging, the corresponding service of the call request belongs to the monitored service, in the call request pair
After the service answered is called, link log is generated.
Optionally, in the above-mentioned methods, the corresponding service of the judgement call request, if belong to monitored clothes
Business, comprising:
Obtain the list of default building, wherein the list includes at least one of blacklist and white list;Wherein, institute
It states blacklist and is used to store the information on services for needing to monitor for storing the information on services for being not necessarily to monitoring, the white list;
The corresponding service of the call request is matched with the information on services in the list;
If the information on services in the corresponding service of call request and the blacklist mismatches, and/or, the calling
It requests corresponding service to match with the information on services in the white list, then judges that the corresponding service of the call request belongs to
In the monitored service.
Optionally, in the above-mentioned methods, the list includes blacklist, and the blacklist includes container levels list and journey
Sequence grade list;Wherein, the container levels list includes a variety of service type informations, and described program grade list includes the calling of service
Method;
It is described to match the corresponding service of the call request with the information on services in the list, comprising:
Determine the type information of the corresponding service of the call request and the method name of calling;
The type information of the service determined is matched with the container levels list in the blacklist, and by institute
The method name for stating the service call determined is matched with program level list in the blacklist;
If the type information of the service determined is not belonging to the container levels list in the blacklist, and the determination
Type information out is not belonging to program level list in the blacklist, then judges that the corresponding service of the call request belongs to institute
State monitored service.
Optionally, in the above-mentioned methods, the list includes white list, and the white list includes container levels list and journey
Sequence grade list;Wherein, the container levels list includes a variety of service type informations, and described program grade list includes the calling of service
Method;
It is described to match the corresponding service of the call request with the information on services in the list, comprising:
Determine the type information of the corresponding service of the call request and the method name of calling;
The type information of the service determined is matched with the container levels list in the white list, and by institute
The method name for stating the service call determined is matched with program level list in the white list;
Wherein, if the type information of the service determined belongs to the container levels list in the white list, and it is described
The type information determined belongs to program level list in the white list, then judges that the corresponding service of the call request belongs to
The monitored service.
Optionally, in the above-mentioned methods, the list includes blacklist and white list, and the white list includes container levels
List and program level list, the blacklist include container levels list and program level list;Wherein, the container levels list includes
A variety of service type informations, described program grade list include the call method of service;
It is described to match the corresponding service of the call request with the information on services in the list, comprising:
Determine the type information of the corresponding service of the call request and the method name of calling;
By the type information of the service determined, respectively with the container levels list of the white list and the blacklist
Container levels list matched, and by the method name of the service call determined, respectively with the program of the white list
The program level list of grade list and the blacklist is matched;
Wherein, if the type information of the service determined belongs to the container levels list of the white list and is not belonging to
The method name of the container levels list of the blacklist, the service call determined belongs to the program level name of the white list
It is single, and be not belonging to the container levels list of the blacklist, then judge that the corresponding service of the call request belongs to described supervised
The service of control.
Optionally, in the above-mentioned methods, after generating link log, further includes:
Obtain the affairs ID and service call chain serial number in the call request;
Update the service call chain serial number;
It is passed according to the affairs ID and the updated service call chain serial number gencration call request, and to next service
It is defeated.
Optionally, in the above-mentioned methods, further includes:
Judge the affairs ID obtained less than in the call request and service call chain serial number, then creates unique thing
Simultaneously service call chain serial number initial value is arranged in business ID.
A kind of generating means of full link log, comprising:
Receiving unit, for receiving call request, wherein the call request is for calling service;
Judging unit, for judging whether the corresponding service of the call request belongs to monitored service;
Generation unit, if it is described monitored to judge that the corresponding service of the call request belongs to for the judging unit
Service generate link log then after the corresponding service of the call request is called.
Optionally, in above-mentioned apparatus, the judging unit, comprising:
First acquisition unit, for obtaining the list of default building, wherein the list includes blacklist and white list
At least one;Wherein, the blacklist is used to store the information on services without monitoring, and the white list needs to monitor for storing
Information on services;
Matching unit, for matching the corresponding service of the call request with the information on services in the list;
If the information on services in the corresponding service of call request and the blacklist mismatches, and/or, the calling
It requests corresponding service to match with the information on services in the white list, then judges that the corresponding service of the call request belongs to
In the monitored service.
Optionally, in above-mentioned apparatus, the list includes blacklist and white list, and the white list includes container levels
List and program level list, the blacklist include container levels list and program level list;Wherein, the container levels list includes
A variety of service type informations, described program grade list include the call method of service;The matching unit, comprising:
Determination unit, for determining the type information of the corresponding service of the call request and the method name of calling;
Coupling subelement, for by the type information of the service determined, respectively with the container levels of the white list
The container levels list of list and the blacklist is matched, and by the method name of the service call determined, respectively with
The program level list of the white list and the program level list of the blacklist are matched;
Wherein, if the type information of the service determined belongs to the container levels list of the white list and is not belonging to
The method name of the container levels list of the blacklist, the service call determined belongs to the program level name of the white list
It is single, and be not belonging to the container levels list of the blacklist, then judge that the corresponding service of the call request belongs to described supervised
The service of control.
A kind of electronic equipment, comprising:
Memory and processor;Wherein, the memory is same as storage computer instruction;The processor is for executing institute
State memory storage computer instruction, specifically execute it is any one of above-mentioned described in full link log generation method.
A kind of storage medium, for storing program, described program is performed, for realizing described in above-mentioned any one
The generation method of full link log.
In the generation method of full link log provided by the present application, after receiving call request, the calling is first judged
Request whether corresponding service belongs to monitored service;Judging that the corresponding service of the call request belongs to described supervised
The service of control generates link log, solves and ask for any one just after the corresponding service of the call request is called
When asking and calling service, generation link log leads to the problem of increasing unnecessary link log.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
The embodiment of application for those of ordinary skill in the art without creative efforts, can also basis
The attached drawing of offer obtains other attached drawings.
Fig. 1 is a kind of flow chart of the generation method of full link log disclosed in the embodiment of the present application;
Fig. 2 is a kind of flow chart of the embodiment for the step S102 that another embodiment of the application discloses;
Fig. 3 is a kind of flow chart of the embodiment for the step S202 that another embodiment of the application discloses;
Fig. 4 is a kind of flow chart of the embodiment for the step S202 that another embodiment of the application discloses;
Fig. 5 is a kind of flow chart of the embodiment for the step S202 that another embodiment of the application discloses;
Fig. 6 is black and white lists display diagram disclosed in another embodiment of the application;
Fig. 7 is a kind of flow chart of the generation method of full link log disclosed in another embodiment of the application;
Fig. 8 is the structural schematic diagram of the generating means of full link log disclosed in another embodiment of the application;
The structural schematic diagram of electronic equipment disclosed in the another embodiment of the present invention of the position Fig. 9.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of embodiments of the present application, instead of all the embodiments.It is based on
Embodiment in the application, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall in the protection scope of this application.
The application proposes the generation method and device of a kind of full link log, to solve to call for any one request
When service, generation link log leads to the problem of increasing unnecessary link log.
As shown in Figure 1, the generation method of full link log disclosed in the embodiment of the present application, comprising steps of
S101, call request is received, wherein the call request is for calling service.
Direction recipient is requested to send call request, to call each service of recipient.As any one node
Recipient, after receiving the call request, determine the call request for request service, i.e. corresponding clothes of call request
Business.
S102, judge whether the corresponding service of the call request belongs to monitored service.
For the service that needs are monitored, node needs to generate link log.Therefore, calling is received in recipient to ask
It asks, after determining the corresponding service of the call request, needs further to judge whether the corresponding service of the call request belongs to and supervised
The service of control.
Wherein, as one is embodiment, label is arranged in the preparatory service to be monitored, and the calling that sender sends is asked
The label for asking the corresponding service of middle carrying call request, determines the corresponding service of call request in recipient, then can use
The mode of tag match services whether belong to monitored service to judge that call request is corresponding.
Optionally, in another embodiment of the application, two names are can be set in the another embodiment of step S102
Single, specially blacklist and white list, the blacklist are used to store the information on services without monitoring, and the white list is for depositing
Storage needs the information on services monitored.Also, in the present embodiment, information on services is also possible to the label of service, can also be certainly
Other information, as long as service can be uniquely determined out.
Specifically, the present embodiment is disclosed to judge whether the corresponding service of the call request belongs to monitored service,
As shown in Figure 2, comprising:
S201, the list for obtaining default building.
In this step, the list of acquisition includes at least one of blacklist and white list.Therefore, white name can only be obtained
It is single, blacklist can also be only obtained, blacklist and white list can also be obtained certainly, judges call request by two lists
Whether corresponding service belongs to monitored service.
S202, the corresponding service of the call request is matched with the information on services in the list obtained.
The different lists acquired according to step S201 match the corresponding service of call request therewith.
Wherein, the matching in this step refers to: by information on services included by the corresponding service of the call request and the list obtained
Similarity comparison is carried out, if judging the corresponding service of the call request and some information on services similarity included by list
It is higher, then illustrate that the corresponding service of call request matches with the information on services in the list.
Optionally, in another embodiment of the application, the list obtained in step S201 includes blacklist, and the black name
Single includes container levels list and program level list;Wherein, the container levels list includes a variety of service type informations, described program
Grade list includes the call method of service.
It should be noted that service corresponding call method will include it is a variety of, such as: http service, call method packet
It includes: UserController.save and UserController.edit etc..But a kind of a variety of call methods of service, and
It does not need whole to be monitored, therefore, in the present embodiment, by setting container levels list and program level list, come respectively to need
The call method for the service that the service and needs to be monitored monitor is set.
In addition, said vesse can also be passed through if the service to certain specially call method is only needed to be monitored
Grade list and program level list are set.
In the present embodiment, a kind of embodiment of step S202, as shown in Figure 3, comprising:
The method name of S301, the type information for determining the corresponding service of the call request and calling.
Requesting party sends call request, and the type information and calling of the service of request call can be carried in the request
Method name, therefore, can directly from call request the type information of reading service and calling method name.Certainly, if it is described
Call request does not include the type information of service and the method name of calling, but the call request is used to need to illustrate its clothes called
Therefore the access path of business and the service determines its service called according to the call request, then obtain the clothes determined
The type information of business.Also, service access path, that is, service call method name, accordingly it is also possible to according to call request come
Determine the method name of service call.
S302, the type information of the service determined is matched with the container levels list in the blacklist,
And the method name of the service call determined is matched with program level list in the blacklist.
Wherein, if the type information of the service determined is not belonging to the container levels list in the blacklist, and institute
It states the type information determined and is not belonging to program level list in the blacklist, then judge the corresponding service of the call request
Belong to the monitored service.
In the present embodiment, blacklist be for saving the information on services for not needing to be monitored, therefore, the appearance in blacklist
What device grade list saved is the type information for not needing the service being monitored, and what program level list saved is not need to be supervised
The call method of the service of control.
Therefore, the type information for the service determined is matched with the container levels list in blacklist, will be determined
Service calling method matched with the program level list in blacklist.And above-mentioned two matching process the result is that: institute
The type information for stating the service determined is not belonging to container levels list in the blacklist, and the type information determined
It is not belonging to program level list in the blacklist, illustrates that the corresponding service of the call request is not belonging to blacklist, then is needed pair
It is monitored.
Optionally, in another embodiment of the application, the list obtained in step S201 includes white list, and the white name
Single includes container levels list and program level list;Wherein, the container levels list includes a variety of service type informations, described program
Grade list includes the call method of service.
In the present embodiment, the another embodiment of step S202, as shown in Figure 4, comprising:
The method name of S401, the type information for determining the corresponding service of the call request and calling.
S402, the type information of the service determined is matched with the container levels list in the white list,
And the method name of the service call determined is matched with program level list in the white list.
Wherein, if the type information of the service determined belongs to the container levels list in the white list, and it is described
The type information determined belongs to program level list in the white list, then judges that the corresponding service of the call request belongs to
The monitored service.
In the present embodiment, it is called what whether the corresponding service of request needed to monitor using the information on services in white list
Judgement.Specifically, the type information for the service determined is matched with the container levels list in white list, by what is determined
Service calling method is matched with the program level list in white list.
Above-mentioned two matching process the result is that: the type information of the service determined belongs in the white list
Container levels list, and the type information determined belongs to program level list in the white list, illustrates that the calling is asked
It asks corresponding service to belong to white list, then needs to be monitored it.
Optionally, in another embodiment of the application, the list obtained in step S201 includes blacklist and white list, and
The white list includes container levels list and program level list, and the blacklist includes container levels list and program level list;Its
In, the container levels list includes a variety of service type informations, and described program grade list includes the call method of service.
In the present embodiment, the another embodiment of step S202, as shown in Figure 5, comprising:
The method name of S501, the type information for determining the corresponding service of the call request and calling.
S502, by the type information of the service determined, respectively with the container levels list of the white list and described
The container levels list of blacklist is matched, and by the method name of the service call determined, respectively with the white list
Program level list and the program level list of the blacklist matched.
Wherein, if the type information of the service determined belongs to the container levels list of the white list and is not belonging to
The method name of the container levels list of the blacklist, the service call determined belongs to the program level name of the white list
It is single, and be not belonging to the container levels list of the blacklist, then judge that the corresponding service of the call request belongs to described supervised
The service of control.
In the present embodiment, determines whether the corresponding service of call request needs to monitor in order to more sufficient, need to adjust
It is matched with the method name of the type information and calling of requesting corresponding service respectively at blacklist and white list.
Such as: it include that HTTP service and JDBC are serviced referring to Fig. 6, in white list, in container levels list, program level list packet
Include the MySQL.dumpBinlog method name of tpc service.It include that HTTP service and JDBC take in blacklist, in container levels list
Business, program level list include the UserController.save and UserController.edit of http service.
When carrying out service monitoring using black, the white list in this example, need to monitor in addition to UserController.save
With the MySQL.dumpBinlog of all http service and tpc service outside UserController.edit, all sides are not monitored
JDBC service under religious name.
If the corresponding service of S203, the call request mismatched with the information on services in the blacklist, and/or, institute
It states the corresponding service of call request to match with the information on services in the white list, then judges that the call request is corresponding
Service belongs to the monitored service.
Wherein, it is to need to monitor that the information on services in blacklist, which is the information on services without monitoring, in white list,.Cause
This, in step s 201, when the list got is blacklist, in the corresponding service of call request and the blacklist
Information on services mismatches, and judges that the corresponding service of the call request belongs to the monitored service;In step s 201,
When the list got is white list, corresponding service of the call request matches with the information on services in the white list,
Judge that the corresponding service of the call request belongs to the monitored service;In step s 201, the list packet got
When including white and black list, corresponding service of the call request matches with the information on services in the white list, and with
Information on services in the blacklist mismatches, and judges that the corresponding service of the call request belongs to the monitored clothes
Business.
If judging, the corresponding service of the call request belongs to the monitored service, then follow the steps S103,
After the corresponding service of the call request is called, link log is generated.
If in step S102, judging that the corresponding service of the call request belongs to monitored service, then illustrating to need
Link log is generated, therefore, after the corresponding service of the call request is called, generates link log.Wherein, link log can
Include: the affairs ID of call request, recipient's mark of call request, call request called service identifiers, allocating time,
Calling interface etc..
If should be noted in step S102, judge that the corresponding service of the call request is not belonging to be monitored
Service, then can exit the process of the present embodiment.
Another embodiment of the application also discloses a kind of generation method of full link log, as shown in fig. 7, comprises step:
S701, call request is received, wherein the call request is for calling service.
S702, judge whether the corresponding service of the call request belongs to monitored service.
If judging, the corresponding service of the call request belongs to the monitored service, then follow the steps S703,
After the corresponding service of the call request is called, link log is generated.
S704, the affairs ID in the acquisition call request and service call chain serial number.
The call request received in step S701 may be needed for calling multiple services.Therefore, in a node
Receive the call request, and after generating link log, it is also necessary to by call request to next node-node transmission.Specifically, being
Make to indicate the call request one link of corresponding link, therefore, it is necessary to obtain affairs ID and clothes in call request
Business call chain serial number.
Optionally, in another embodiment of the application, judge to obtain less than the affairs ID in the call request with
And in the case where service call chain serial number, then illustrate that the call request is the starting of entire link, therefore, it is necessary to be entire link
Unique affairs ID is created, and service call chain serial number initial value is set.
S705, the service call chain serial number is updated.
Wherein, for the ease of the different nodes of resolution link, the initial value of service call chain serial number may be configured as 0.Also,
Service call chain serial number is updated, then is to add one on the basis of original service call chain serial number, is used to illustrate to have passed through one
A node.
S706, according to the affairs ID and the updated service call chain serial number gencration call request, and to next
Service transmission.
Specifically, the call request that this step generates is as call request to be generated, a kind of implementation of generating mode
Mode are as follows: establish the association between the affairs ID, the updated service call chain serial number and call request to be generated
Relationship, so that can use the call request to be generated after the call request to be generated is sent to next service,
The affairs ID and the updated service call chain serial number are obtained in incidence relation.It, can be in another embodiment
The ID and the updated service call chain serial number are carried in the call request to be generated, in this way, can be from
Obtained in call request to be generated carrying affairs ID and updated service call chain serial number.
After next service receives call request, then it can be carried out according to the black and white lists of node sets where itself
Whether the judgement of link log is generated.
It should also be noted that, in the present embodiment, the specific work process of step S701~S703, reference can be made to above-mentioned implementation
Example content, details are not described herein again.
Another embodiment of the application also discloses a kind of generating means of full link log, as shown in Figure 8, comprising:
Receiving unit 801, for receiving call request, wherein the call request is for calling service.
Judging unit 802, for judging whether the corresponding service of the call request belongs to monitored service.
Generation unit 803, if judging that the corresponding service of the call request belongs to the quilt for the judging unit
The service of monitoring then generates link log after the corresponding service of the call request is called.
The specific work process of each unit in the embodiment of the present application can be found in the embodiment content of corresponding diagram 1, herein
It repeats no more.
Optionally, in another embodiment of the application, judging unit 802, comprising:
First acquisition unit, for obtaining the list of default building, wherein the list includes blacklist and white list
At least one;Wherein, the blacklist is used to store the information on services without monitoring, and the white list needs to monitor for storing
Information on services.
Matching unit, for matching the corresponding service of the call request with the information on services in the list.
If the information on services in the corresponding service of call request and the blacklist mismatches, and/or, the calling
It requests corresponding service to match with the information on services in the white list, then judges that the corresponding service of the call request belongs to
In the monitored service.
The specific work process of each unit in the embodiment of the present application can be found in the embodiment content of corresponding diagram 2, herein
It repeats no more.
Optionally, in another embodiment of the application, the list includes blacklist and white list, and the white list packet
Container levels list and program level list are included, the blacklist includes container levels list and program level list;Wherein, the container levels
List includes a variety of service type informations, and described program grade list includes the call method of service;The matching unit, comprising:
Determination unit, for determining the type information of the corresponding service of the call request and the method name of calling.
Coupling subelement, for by the type information of the service determined, respectively with the container levels of the white list
The container levels list of list and the blacklist is matched, and by the method name of the service call determined, respectively with
The program level list of the white list and the program level list of the blacklist are matched.
Wherein, if the type information of the service determined belongs to the container levels list of the white list and is not belonging to
The method name of the container levels list of the blacklist, the service call determined belongs to the program level name of the white list
It is single, and be not belonging to the container levels list of the blacklist, then judge that the corresponding service of the call request belongs to described supervised
The service of control.
Optionally, in another embodiment of the application, the list includes blacklist, and the blacklist includes container levels
List and program level list;Wherein, the container levels list includes a variety of service type informations, and described program grade list includes clothes
The call method of business;The matching unit is used for:
Determine the type information of the corresponding service of the call request and the method name of calling;
The type information of the service determined is matched with the container levels list in the blacklist, and by institute
The method name for stating the service call determined is matched with program level list in the blacklist;
If the type information of the service determined is not belonging to the container levels list in the blacklist, and the determination
Type information out is not belonging to program level list in the blacklist, then judges that the corresponding service of the call request belongs to institute
State monitored service.
Optionally, in another embodiment of the application, the list includes white list, and the white list includes container levels
List and program level list;Wherein, the container levels list includes a variety of service type informations, and described program grade list includes clothes
The call method of business;The matching unit is used for:
Determine the type information of the corresponding service of the call request and the method name of calling;
The type information of the service determined is matched with the container levels list in the white list, and by institute
The method name for stating the service call determined is matched with program level list in the white list;
Wherein, if the type information of the service determined belongs to the container levels list in the white list, and it is described
The type information determined belongs to program level list in the white list, then judges that the corresponding service of the call request belongs to
The monitored service.
The specific work process of unit disclosed in the above-mentioned several embodiments of the application, reference can be made in corresponding embodiment of the method
Hold, details are not described herein again.
Another embodiment of the application also discloses a kind of electronic equipment, as shown in Figure 9, comprising: memory 901 and processor
902;Wherein, memory 901 is same as storage computer instruction;The computer that processor 902 is used to execute the storage of memory 901 refers to
Enable, specifically execute it is any one of above-mentioned described in full link log generation method.
Another embodiment of the application also discloses a kind of storage medium, and for storing program, described program is performed, and uses
In the generation method for realizing full link log described in above-mentioned any one.
In the above embodiments of the present application, it can be realized in whole or in part by software, hardware or a combination thereof.
When implemented in software, it can realize in the form of a computer program product in whole or in part.The computer program
Product includes one or more computer instruction.When loading on computers and executing the computer program instructions, all
Or partly generate according to process or function described in the embodiment of the present application, the computer can be by computer, specially
With computer, computer network or other editable devices.The computer instruction can store in computer-readable storage
In medium, or from a computer readable storage medium to the transmission of another computer readable storage medium, such as: the meter
The instruction of calculation machine can pass through wired (such as coaxial cable, multiple twin from a web-site, computer, server or data center
Line, optical fiber) or wireless (such as infrared, wireless, microwave etc.) mode to another web-site, computer, server or number
It is transmitted according to center.The computer readable storage medium can be any usable medium that computer can access either
The data storage devices such as server, the data center integrated including one or more usable medium.The usable medium can be with
It is magnetic medium, (such as: floppy disk, hard disk, tape), optical medium (such as: CD) or semiconductor medium (such as solid-state is hard
Disk (SSD)) etc..
Professional technician can be realized or use the application.Profession of the various modifications to these embodiments to this field
It will be apparent for technical staff, the general principles defined herein can not depart from spirit herein or model
In the case where enclosing, realize in other embodiments.Therefore, the application is not intended to be limited to the embodiments shown herein,
And it is to fit to the widest scope consistent with the principles and novel features disclosed herein.
Claims (10)
1. a kind of generation method of full link log characterized by comprising
Receive call request, wherein the call request is for calling service;
Judge whether the corresponding service of the call request belongs to monitored service;
If judging, the corresponding service of the call request belongs to the monitored service, corresponding in the call request
After service is called, link log is generated.
2. the method according to claim 1, wherein the corresponding service of the judgement call request, if
Belong to monitored service, comprising:
Obtain the list of default building, wherein the list includes at least one of blacklist and white list;Wherein, described black
List is used to store the information on services without monitoring, and the white list is used to store the information on services for needing to monitor;
The corresponding service of the call request is matched with the information on services in the list;
If the information on services in the corresponding service of call request and the blacklist mismatches, and/or, the call request
Corresponding service matches with the information on services in the white list, then judges that the corresponding service of the call request belongs to institute
State monitored service.
3. according to the method described in claim 2, it is characterized in that, the list includes blacklist, and the blacklist includes
Container levels list and program level list;Wherein, the container levels list includes a variety of service type informations, described program grade list
Call method including service;
It is described to match the corresponding service of the call request with the information on services in the list, comprising:
Determine the type information of the corresponding service of the call request and the method name of calling;
The type information of the service determined is matched with the container levels list in the blacklist, and will be described true
The method name for the service call made is matched with program level list in the blacklist;
If the type information of the service determined is not belonging to the container levels list in the blacklist, and described determines
Type information is not belonging to program level list in the blacklist, then judges that the corresponding service of the call request belongs to the quilt
The service of monitoring.
4. according to the method described in claim 2, it is characterized in that, the list includes white list, and the white list includes
Container levels list and program level list;Wherein, the container levels list includes a variety of service type informations, described program grade list
Call method including service;
It is described to match the corresponding service of the call request with the information on services in the list, comprising:
Determine the type information of the corresponding service of the call request and the method name of calling;
The type information of the service determined is matched with the container levels list in the white list, and will be described true
The method name for the service call made is matched with program level list in the white list;
Wherein, if the type information of the service determined belongs to the container levels list in the white list, and the determination
Type information out belongs to program level list in the white list, then it is described to judge that the corresponding service of the call request belongs to
Monitored service.
5. according to the method described in claim 2, it is characterized in that, the list includes blacklist and white list, and it is described white
List includes container levels list and program level list, and the blacklist includes container levels list and program level list;Wherein, described
Container levels list includes a variety of service type informations, and described program grade list includes the call method of service;
It is described to match the corresponding service of the call request with the information on services in the list, comprising:
Determine the type information of the corresponding service of the call request and the method name of calling;
By the type information of the service determined, respectively with the appearance of the container levels list of the white list and the blacklist
Device grade list is matched, and by the method name of the service call determined, respectively with the program level name of the white list
The program level list of the single and described blacklist is matched;
Wherein, if the type information of the service determined belongs to the container levels list of the white list and is not belonging to described
The method name of the container levels list of blacklist, the service call determined belongs to the program level list of the white list, and
It is not belonging to the container levels list of the blacklist, then judges that the corresponding service of the call request belongs to the monitored clothes
Business.
6. the method according to claim 1, wherein after the generation link log, further includes:
Obtain the affairs ID and service call chain serial number in the call request;
Update the service call chain serial number;
According to the affairs ID and the updated service call chain serial number gencration call request, and to next service transmission.
7. according to the method described in claim 6, it is characterized by further comprising:
Judge the affairs ID obtained less than in the call request and service call chain serial number, then creates unique affairs ID
And service call chain serial number initial value is set.
8. a kind of generating means of full link log characterized by comprising
Receiving unit, for receiving call request, wherein the call request is for calling service;
Judging unit, for judging whether the corresponding service of the call request belongs to monitored service;
Generation unit, if judging that the corresponding service of the call request belongs to the monitored clothes for the judging unit
Business generates link log then after the corresponding service of the call request is called.
9. a kind of electronic equipment characterized by comprising
Memory and processor;Wherein, the memory is same as storage computer instruction;The processor is for executing described deposit
The computer instruction of reservoir storage, the specific generation side for executing the full link log as described in any one of claim 1-7
Method.
10. a kind of storage medium, which is characterized in that for storing program, described program is performed, and is wanted for realizing such as right
Seek the generation method of full link log described in 1-7 any one.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811442226.1A CN109600254B (en) | 2018-11-29 | 2018-11-29 | Method for generating full-link log and related system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811442226.1A CN109600254B (en) | 2018-11-29 | 2018-11-29 | Method for generating full-link log and related system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109600254A true CN109600254A (en) | 2019-04-09 |
CN109600254B CN109600254B (en) | 2022-04-26 |
Family
ID=65959723
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811442226.1A Active CN109600254B (en) | 2018-11-29 | 2018-11-29 | Method for generating full-link log and related system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109600254B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111124819A (en) * | 2019-12-10 | 2020-05-08 | 中国建设银行股份有限公司 | Method and device for monitoring full link |
CN112363855A (en) * | 2020-11-13 | 2021-02-12 | 北京基调网络股份有限公司 | Call chain data generation method, topology generation method and system and computer equipment |
CN114884807A (en) * | 2022-05-20 | 2022-08-09 | 远景智能国际私人投资有限公司 | Link log generation method and device, Internet of things platform and storage medium |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130110758A1 (en) * | 2011-10-28 | 2013-05-02 | Xerox Corporation | Methods and systems for scalable extraction of episode rules using incremental episode tree construction in a multi-application event space |
CN203039704U (en) * | 2012-08-07 | 2013-07-03 | 北京鼎震科技有限责任公司 | Web log storage system |
CN103220277A (en) * | 2013-04-01 | 2013-07-24 | 新浪技术(中国)有限公司 | Method, device and system for monitoring cross site scripting attacks |
CN104065657A (en) * | 2014-06-26 | 2014-09-24 | 北京思特奇信息技术股份有限公司 | Method for dynamically controlling user behavior based on IP access and system thereof |
CN104346365A (en) * | 2013-07-30 | 2015-02-11 | 阿里巴巴集团控股有限公司 | Device and method for determining specific service associated logs |
CN105653943A (en) * | 2015-12-24 | 2016-06-08 | 北京奇虎科技有限公司 | Log auditing method and system for android applications |
CN105827522A (en) * | 2015-11-10 | 2016-08-03 | 广东亿迅科技有限公司 | Gateway equipment for processing log files |
CN106777371A (en) * | 2017-01-23 | 2017-05-31 | 北京齐尔布莱特科技有限公司 | Result collection system and method |
CN108462598A (en) * | 2017-02-21 | 2018-08-28 | 阿里巴巴集团控股有限公司 | A kind of daily record generation method, log analysis method and device |
-
2018
- 2018-11-29 CN CN201811442226.1A patent/CN109600254B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130110758A1 (en) * | 2011-10-28 | 2013-05-02 | Xerox Corporation | Methods and systems for scalable extraction of episode rules using incremental episode tree construction in a multi-application event space |
CN203039704U (en) * | 2012-08-07 | 2013-07-03 | 北京鼎震科技有限责任公司 | Web log storage system |
CN103220277A (en) * | 2013-04-01 | 2013-07-24 | 新浪技术(中国)有限公司 | Method, device and system for monitoring cross site scripting attacks |
CN104346365A (en) * | 2013-07-30 | 2015-02-11 | 阿里巴巴集团控股有限公司 | Device and method for determining specific service associated logs |
CN104065657A (en) * | 2014-06-26 | 2014-09-24 | 北京思特奇信息技术股份有限公司 | Method for dynamically controlling user behavior based on IP access and system thereof |
CN105827522A (en) * | 2015-11-10 | 2016-08-03 | 广东亿迅科技有限公司 | Gateway equipment for processing log files |
CN105653943A (en) * | 2015-12-24 | 2016-06-08 | 北京奇虎科技有限公司 | Log auditing method and system for android applications |
CN106777371A (en) * | 2017-01-23 | 2017-05-31 | 北京齐尔布莱特科技有限公司 | Result collection system and method |
CN108462598A (en) * | 2017-02-21 | 2018-08-28 | 阿里巴巴集团控股有限公司 | A kind of daily record generation method, log analysis method and device |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111124819A (en) * | 2019-12-10 | 2020-05-08 | 中国建设银行股份有限公司 | Method and device for monitoring full link |
CN111124819B (en) * | 2019-12-10 | 2023-09-22 | 中国建设银行股份有限公司 | Method and device for full link monitoring |
CN112363855A (en) * | 2020-11-13 | 2021-02-12 | 北京基调网络股份有限公司 | Call chain data generation method, topology generation method and system and computer equipment |
CN112363855B (en) * | 2020-11-13 | 2021-06-18 | 北京基调网络股份有限公司 | Call chain data generation method, topology generation method and system and computer equipment |
CN114884807A (en) * | 2022-05-20 | 2022-08-09 | 远景智能国际私人投资有限公司 | Link log generation method and device, Internet of things platform and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN109600254B (en) | 2022-04-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106888233B (en) | Data updating system and method | |
CN110677462B (en) | Access processing method, system, device and storage medium for multi-block chain network | |
CN109600254A (en) | The generation method and related system of full link log | |
CN109964507B (en) | Network function management method, management unit and system | |
CN109788027A (en) | Method of data synchronization, device, server and computer storage medium | |
CN115004673B (en) | Message pushing method, device, electronic equipment and computer readable medium | |
CN111258627A (en) | Interface document generation method and device | |
CN106095483A (en) | The Automation arranging method of service and device | |
CN109348434B (en) | Scene information sending method, sending device and terminal equipment | |
CN110912990B (en) | Method and related equipment for updating consensus period | |
CN111405052A (en) | P2P penetration method based on port prediction, electronic device and medium | |
CN110049503B (en) | Method and equipment for acquiring data | |
CN114090623A (en) | Method and device for creating cache resources, electronic equipment and storage medium | |
CN116170522B (en) | Data transmission method and device, electronic equipment and storage medium | |
CN112363980A (en) | Data processing method and device for distributed system | |
CN116761144A (en) | Method and device for accessing equipment to Internet of things platform | |
CN111831503B (en) | Monitoring method based on monitoring agent and monitoring agent device | |
CN111309693A (en) | Data synchronization method, device and system, electronic equipment and storage medium | |
CN113553206B (en) | Data event execution method and device, electronic equipment and computer readable medium | |
CN112380411B (en) | Sensitive word processing method, device, electronic equipment, system and storage medium | |
CN114125812A (en) | Data synchronization method, device, server and storage medium | |
CN108228272A (en) | WEB containers generation processing method, equipment and server | |
CN108805741B (en) | Fusion method, device and system of power quality data | |
CN112256714A (en) | Data synchronization method and device, electronic equipment and computer readable medium | |
CN113742617A (en) | Cache updating method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |